Extracting voicemails, prompts, etc. from Cisco Unity Express (CUE) backups


There is very little explaining how to do this, so I thought I would add what I’ve learned.  We’ve been doing a painful move from a UC560 that never worked very well to FreePBX that’s a lot cheaper and works better.

You have to log into CUE (via the CME « service-module Integrated-Service-Engine 0/0 session » command), then set the backup server and run the offline backup procedure.

CUE backups are basically postgres databases.  If you can FTP the backups from CUE to your machine and strip off the top 16 lines of junk that Cisco adds, you can use pg_restore to restore them and extract the data in a usable format.

Here’s how I imported the VoiceMail backup (you need to run as user postgres) – this gets voicemail greetings as well as saved messages:

tail -n +16 VoiceMail_1.backup > VoiceMail_1.backup.new && pg_restore -C VoiceMail_1.backup.new | psql

Once they were loaded…

Voir l’article original 158 mots de plus

How to do basic setup of cisco ASA 5505

Andrew's blog of things

When you open the box containing your new ASA 5505 and plug in your console you will see the following:

Type help or ‘?’ for a list of available commands.

Here you type the command “enable” to get in enabled mode.

Type help or ‘?’ for a list of available commands.
ciscoasa> enable

As you can see you will get a password prompt. Simply hit enter here because there is no enable password configured.

The 1st thing you want to do is type the command “write erase”. This will delete all the default configuration Cisco made for you. You might wonder why but there is a lot of stuff in that configuration that you don’t need/want and could even cause some network issues if you connected it to your network (DHCP).

ciscoasa# write erase
Erase configuration in flash memory? [confirm]

You will be prompted to…

Voir l’article original 1 124 mots de plus

Clear Cisco VTY via SNMP

In this lazy IT world it can happen often, that somebody forget to log out from a device. If all VTY will be busy, you will not able to log into the device anymore, you’ll get the following output back:

telnet kcorp_lab_r1
telnet: Unable to connect to remote host: Connection refused

This error message can mean different things:

  • telnet is not enabled
  • your IP has been filtered by an ACL
  • all VTY is full

Then what can we do?
If we can connect to the device earlier, it’s almost 100% sure that it’s a VTY issue. All lines are busy.

Here is the solution! If we have read/write snmp community configured on the device, we can use our snmp server to clear the line.

Check the lines

snmpwalk -v 2c -c <RO community> <destination_ip>

The results of the command will display all lines on the device.


Voir l’article original 204 mots de plus

Nick Gonzalez Set To Guest On THE FLASH As Cisco’s Brother

Geek Eclectic Productions

With the news that Peyton List had been cast as Leonard Snart’s little sister Lisa a.k.a. the Golden Glider, there is more casting news! Nicholas Gonzalez (Sleepy Hollow) has been cast in a guest spot as Dante, the charming older brother of Carlos Valdes’ Cisco. Dante is the family favorite who is « a gifted pianist, who never reached his potential and secretly resents Cisco’s success. » However, « When the brothers are thrust into extreme circumstances, Dante must rely on Cisco if they’re going to survive. » It looks like the Valdes bros may be coming face-to-face with a baddie, possibly Golden Glider?

Gonzalez confirmed his casting in a tweet, which you can read below:

Voir l’article original

Lets just go ahead and use DTP & VLAN 1… Part 0: What using DTP & VLAN 1 means

The CCIE Journey

By default, DTP auto negation is enabled on Cisco switches on all layer 2 ports and they are placed in VLAN 1. These two defaults allow for an easy way to just deploy a switch, or attach another switch to gain more port density, without needing any configuration knowledge. While this is very helpful, the use of VLAN 1 and leaving DTP auto negation on has been widely accepted as standard use for data ports and in turn has left the ability for someone with physical access to gain access to other VLANs and the devices in them.

In part 0 of this series we are going to go over the theory of why the use of DTP and VLAN 1 could be used to allow for an attacker to execute a VLAN hopping attack.


Dynamic Trunking Protocol (DTP) is a Cisco proprietary protocol used to allow for trunks to automatically…

Voir l’article original 851 mots de plus